Cargando…

Kerberos : the definitive guide /

Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Garman, Jason
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA ; Farnham : O'Reilly, 2003.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocm54116500
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 040130s2003 caua o 001 0 eng d
040 |a OCL  |b eng  |e pn  |c OCL  |d OCLCQ  |d UMC  |d GZM  |d OCLCQ  |d CUSER  |d OCLCE  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d COO  |d OCLCO  |d OCLCQ  |d OCLCO  |d FEM  |d STF  |d OCLCO  |d OCLCQ 
019 |a 326763157  |a 594464604  |a 607058608  |a 968012319  |a 968976465  |a 1100383623 
020 |a 9781449391423  |q (e-book) 
020 |a 1449391427  |q (e-book) 
020 |a 9781449390778 
020 |a 1449390773 
020 |z 0596004036 
020 |z 9780596004033 
029 1 |a AU@  |b 000066231860 
035 |a (OCoLC)54116500  |z (OCoLC)326763157  |z (OCoLC)594464604  |z (OCoLC)607058608  |z (OCoLC)968012319  |z (OCoLC)968976465  |z (OCoLC)1100383623 
037 |a 6452402445489851583  |b TotalBoox  |f Ebook only  |n www.totalboox.com 
042 |a dlr 
050 4 |a QA76.9.A25  |b G37 2003 
050 4 |a TK5105.59  |b .G375 2003 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Garman, Jason. 
245 1 0 |a Kerberos :  |b the definitive guide /  |c Jason Garman. 
250 |a 1st ed. 
260 |a Sebastopol, CA ;  |a Farnham :  |b O'Reilly,  |c 2003. 
300 |a 1 online resource (xiv, 253 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
520 |a Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary. Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need. Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting. In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations. If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Access control. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Digital signatures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Signature numérique. 
650 1 7 |a Computer networks  |x Access control.  |2 bisacsh 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Digital signatures.  |2 fast  |0 (OCoLC)fst00893725 
776 0 8 |i Print version:  |a Garman, Jason.  |t Kerberos.  |b 1st ed.  |d Sebastopol, CA ; Farnham : O'Reilly, 2003  |z 0596004036  |w (OCoLC)52785065 
856 4 0 |u https://learning.oreilly.com/library/view/~/0596004036/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP